In GoCD, versions 19.6.0 to 21.1.0 are vulnerable to Cross-Site Request Forgery due to missing CSRF protection at the `/go/api/config/backup` endpoint. An attacker can trick a victim to click on a malicious link which could change backup configurations or execute system commands in the post_backup_script field.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25924%2C | |
https://github.com/gocd/gocd/commit/7d0baab0d361c377af84994f95ba76c280048548 | third party advisory patch |